Archive

Category Archives for "Networking"

Top Apple stories of 2016

The biggest Apple stories of 2016Image by AppleApple experienced many ups and downs during 2016. While the company pushed out several new products—from the iPhone 7 to the recently released MacBook Pro—it has been over the past 12 months pigeonholed as a company that has lost its ability to innovate.To read this article in full or to leave a comment, please click here

10 biggest hacks of user data in 2016

You take great pains to come up with a strong password when registering for an account on a website -- only to see your efforts go for naught when that site gets hacked. Several sites had their databases of user accounts not only breached but stolen this year, which include the necessary information for logins (i.e. username, password). The following sites are ranked starting at the fewest number of user accounts with passwords that were taken.To read this article in full or to leave a comment, please click here(Insider Story)

10 biggest hacks of user data in 2016

You take great pains to come up with a strong password when registering for an account on a website -- only to see your efforts go for naught when that site gets hacked. Several sites had their databases of user accounts not only breached but stolen this year, which include the necessary information for logins (i.e. username, password). The following sites are ranked starting at the fewest number of user accounts with passwords that were taken.Also, these hacks were reported to have been executed during 2016. So this list does not feature Myspace (427 million user accounts stolen) or Yahoo! (a cool billion). Both were hacked supposedly before 2016, but were only reported this year. This list also does not include reports of user records that were exposed due to poor security, but where there is no evidence they were actually stolen.To read this article in full or to leave a comment, please click here(Insider Story)

Review: Threat hunting turns the tables on attackers

Advanced Persistent Threats are able to slip past even the most cutting-edge security defenses thanks in large part to a diabolically clever strategy. The threat actors behind successful APTs research the employees, practices and defenses of the organizations they want to attack. They may try to breach the defenses hundreds or thousands of times, then learn from their mistakes, modify their behavior, and finally find a way to get in undetected.Once a network is breached, most APTs go into a stealth mode. They move slowly, laterally compromising other systems and inching toward their goals. Post-mortems from successful attacks often show that the time an APT breached a system to the time it was detected could be anywhere from six months to a year or more. And, they are often only detected after making that final big move where there is a huge exfiltration of critical data.To read this article in full or to leave a comment, please click here(Insider Story)

Inside 3 top threat hunting tools

Taking down the threatImage by ThinkstockAdvanced Persistent Threats (APT) are able to slip past even the most cutting-edge security defenses thanks to a diabolically clever strategy. Hackers may try to breach your defenses thousands of times until they finally get in. Once a network is breached, most APTs go into stealth mode. They move slowly, laterally compromising other systems and inching toward their goals. But what if you could hunt down these active, but hidden threats before they can do real damage? For this review, we tested threat hunting systems from Sqrrl, Endgame and Infocyte. Read the full review as well.To read this article in full or to leave a comment, please click here

Inside 3 top threat hunting tools

Taking down the threatImage by ThinkstockAdvanced Persistent Threats (APT) are able to slip past even the most cutting-edge security defenses thanks to a diabolically clever strategy. Hackers may try to breach your defenses thousands of times until they finally get in. Once a network is breached, most APTs go into stealth mode. They move slowly, laterally compromising other systems and inching toward their goals. But what if you could hunt down these active, but hidden threats before they can do real damage? For this review, we tested threat hunting systems from Sqrrl, Endgame and Infocyte. Read the full review as well.To read this article in full or to leave a comment, please click here

Review: Threat hunting turns the tables on attackers

Advanced Persistent Threats are able to slip past even the most cutting-edge security defenses thanks in large part to a diabolically clever strategy. The threat actors behind successful APTs research the employees, practices and defenses of the organizations they want to attack. They may try to breach the defenses hundreds or thousands of times, then learn from their mistakes, modify their behavior, and finally find a way to get in undetected.To read this article in full or to leave a comment, please click here(Insider Story)

5 enterprise technologies that will shake things up in 2017

You think you have your hands full as an IT pro now? Just wait until blockchain, IoT, augmented and virtual reality, and these other technologies really start to take hold in 2017. Thinkstock The Internet of Things – for real Yes, yes, we know – it’s one of those long-standing tech industry jokes, like “the year of the Linux desktop” and “Java security.” But 2017 really could be the year that all the hub-bub and hype around the Internet of Things comes home to roost.To read this article in full or to leave a comment, please click here

5 enterprise technologies that will shake things up in 2017

You think you have your hands full as an IT pro now? Just wait until blockchain, IoT, augmented and virtual reality, and these other technologies really start to take hold in 2017. Thinkstock The Internet of Things – for real Yes, yes, we know – it’s one of those long-standing tech industry jokes, like “the year of the Linux desktop” and “Java security.” But 2017 really could be the year that all the hub-bub and hype around the Internet of Things comes home to roost.To read this article in full or to leave a comment, please click here

LinkedIn skill learning unit Lynda.com hit by database breach

Lynda.com, the online learning unit of LinkedIn, has reset passwords for some of its users after it discovered recently that an unauthorized external party had accessed a database containing user data.The passwords of close to 55,000 affected users were reset as a precautionary measure and they have been notified of the issue, LinkedIn said in a statement over the weekend.The professional network is also notifying about 9.5 million Lynda.com users who “had learner data, but no protected password information,” in the breached database. “We have no evidence that any of this data has been made publicly available and we have taken additional steps to secure Lynda.com accounts,” according to the statement.To read this article in full or to leave a comment, please click here

LinkedIn skill learning unit Lynda.com hit by database breach

Lynda.com, the online learning unit of LinkedIn, has reset passwords for some of its users after it discovered recently that an unauthorized external party had accessed a database containing user data.The passwords of close to 55,000 affected users were reset as a precautionary measure and they have been notified of the issue, LinkedIn said in a statement over the weekend.The professional network is also notifying about 9.5 million Lynda.com users who “had learner data, but no protected password information,” in the breached database. “We have no evidence that any of this data has been made publicly available and we have taken additional steps to secure Lynda.com accounts,” according to the statement.To read this article in full or to leave a comment, please click here

Connecting VIRL to the Outside World

I’ve been leveraging VIRL for some time to build and test self-contained labs. I’ve always known that there was some ability to connect to the world outside of this environment. Recently, I decided to configure this functionality and I wanted to take just a moment to share what I found.

First and foremost, this isn’t anything difficult or time consuming. So if you have a need to leverage physical devices with your VIRL deployment, don’t hesitate before building it out.

There are two mechanisms for outside connectivity. The first mechanism is called SNAT. This method basically builds static NAT in and out of the environment. I get how this could be beneficial, but I would typically prefer to keep any NAT configuration contained to an environment that I am very familiar with (possibly an ASA or IOS instance outside the lab when an additional NAT layer is required).

The second method, and configuration we will be testing is called FLAT. In this configuration, VIRL connects a L2 broadcast domain between a lab device and an Ethernet interface. In my example I am running the VIRL components in a VM environment on ESXi. So this is a virtual interface that needs Continue reading

68% off Cambridge SoundWorks OontZ Angle 3 PLUS Wireless Bluetooth Speaker – Deal Alert

Designed and Engineered by Cambridge SoundWorks to deliver richer fuller bass; the PLUS delivers surprising bass from such a small speaker, excellent bass performance across each type of music genre.  The PLUS battery technology and power saving design allows this speaker to play up to 30 hours from a full charge with volume set up to 2/3 of maximum playing volume.  IPX5 water resistance makes the unit splashproof, rainproof, dustproof, and sandproof.  Check out the dramatically discounted OontZ Angle 3 PLUS from Cambridge Soundworks now on Amazon.To read this article in full or to leave a comment, please click here

44% off Miracle-Gro AeroGarden Harvest with Gourmet Herb Seed Pod Kit – Deal Alert

AeroGardens are the world’s leading indoor gardening systems. You can grow up to 6 plants in this garden and they’ll love the 20 watts of high performance, energy efficient LED lighting. The LED lights are tuned to the specific spectrum that allows plants to maximize photosynthesis, resulting in rapid, natural growth and abundant harvests. The LED lights concentrate daylight white LEDs for fast growth, blue LEDs for bigger yields, and red LEDs for more flowers and fruit. With ideal lighting and optimally balanced levels of water and nutrients, plants grow up to 5 times faster than when grown in soil.  Its typical list price of $159.95 has been reduced 44% to $89.95. See it on Amazon.To read this article in full or to leave a comment, please click here

Using free Yandex DNS service in an automated way

This DNS story started when I bought a domain with a specific need — to dynamically create and delete DNS records for Nuage Networks components we use during Proof Of Concepts and customers trials. Earlier I used to rely on Dynamic DNS services (i.e. no-ip.com) whenever I needed a DNS name for my public endpoints. But this approach has two

The Grugq, Hacker House and ‘Boceffus Cleetus’ weigh in on the latest ShadowBroker dump

If you enjoy good security-related reads, then you might like to check out a couple different takes on the latest ShadowBrokers’ NSA-linked Equation Group auction files. One comes from “the grugq,” a security researcher who is well-respected for his infosec and counterintelligence knowledge, and the other is by the cybersecurity researchers at Hacker House out of the UK.The Grugq published a three-part commentary series on the great cyber game – part 1, part 2, part 3. His deep analysis is his contribution since not many are capable of it. He said that the latest by the ShadowBrokers, dropped on Dec. 14, is a “massive” and valuable drop in terms of revealing to the NSA what the Russians know and have obtained.To read this article in full or to leave a comment, please click here

The Grugq, Hacker House and ‘Boceffus Cleetus’ weigh in on the latest ShadowBroker dump

If you enjoy good security-related reads, then you might like to check out a couple different takes on the latest ShadowBrokers’ NSA-linked Equation Group auction files. One comes from “the grugq,” a security researcher who is well-respected for his infosec and counterintelligence knowledge, and the other is by the cybersecurity researchers at Hacker House out of the UK.The Grugq published a three-part commentary series on the great cyber game – part 1, part 2, part 3. His deep analysis is his contribution since not many are capable of it. He said that the latest by the ShadowBrokers, dropped on Dec. 14, is a “massive” and valuable drop in terms of revealing to the NSA what the Russians know and have obtained.To read this article in full or to leave a comment, please click here

IP Networking – generational shift in the industry to pure-L3 network stack

© Calico project (http://docs-archive.projectcalico.org/en/1.4.3/addressing.html)
After years and years of innovation, the networking industry is changing. IPv6 is now slowly being adopted - both by interest and need. With all of IPv4 addresses having been exhausted it is now a mandate on the requester to either move to IPv6 or pay a hefty premium for repurchase of v4 addresses. On the other spectrum I believe that Calico and other projects that do pure L3 only networking, is a newer approach to network segregation; not just solving specific problems in the networking infra but a trend that will slowly be adopted widely in the network community. This is mainly also because of IPv6 acting as a booster to moving to a L3 pure play networking solution. This move to L3 only networking can be seen across the infra stack - from physical servers to VMs to containers.

Docker networking eco-system begun with libnetwork and after that has propagated with multitude of solutions by both community and networking vendors. Unlike Flannel (CoreOS) and VXLAN which leverage tunneling and L2 protocols, Calico is a distributed L3 networking solution that works both with Virtual Machines and Continue reading

40% discount for the NEW YEAR on all CCDE Products !

    40% New Year Discount On all CCDE Products Starts December 16 Thru 31 of December 2016 40% OFF On Below Products !  CCDE In-Depth  New CCDE Workbook buy now » Live/Instructor-Led  Online CCDE Training  buy now » Self Paced CCDE Training Lifetime Access buy now »   Note : Discount is valid for both Online Instructor Led […]

The post 40% discount for the NEW YEAR on all CCDE Products ! appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.